Network Ids Approach to Counter Zombie Explorative Attacks Using Network Intrusion Detection and Countermeasures Election (NICE)

Download Now
Provided by: Creative Commons
Topic: Cloud
Format: PDF
Attackers can look at vulnerabilities of a cloud system and compromise virtual machines to organize additional large-scale Distributed Denial-of-Service (DDoS). DDoS attacks generally occupy early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks through the compromised zombies. Within the cloud system particularly the Infrastructure-as-a-Service (IaaS) clouds the detection of zombie study attacks is tremendously hard. This is for the reason that cloud users may set up susceptible applications on their virtual machines.
Download Now

Find By Topic